Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method and authentication device of connection device and connection device

A technology of a connection device and an authentication method, applied in the directions of safety devices, safety communication devices, usage of multiple keys/algorithms, etc., can solve problems such as increased charging costs, failure to charge normally, and the inability of charging equipment to achieve fast charging of terminal equipment, etc. To avoid waste of resources and achieve the effect of switching

Pending Publication Date: 2022-06-17
ZHEJIANG GEOFORCECHIP TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, usually only one authentication key is set in the charging device. When the validity of the authentication key is judged, if the judgment result is invalid, the charging device cannot realize fast charging with the terminal device, or even Can't charge normally
[0004] This has just led to the waste of resources on the charging equipment during the charging process in the prior art, increasing the charging cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and authentication device of connection device and connection device
  • Authentication method and authentication device of connection device and connection device
  • Authentication method and authentication device of connection device and connection device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be described clearly and completely below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of the present application, but not all of the embodiments. The components of the embodiments of the present application generally described and illustrated in the drawings herein may be arranged and designed in a variety of different configurations.

[0058] Thus, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the application as claimed, but is merely representative of selected embodiments of the application. Based on the embodiments in this application, all other embodiments obtained by tho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication method and an authentication device of a connecting device and the connecting device, and belongs to the technical field of charging authentication. The method comprises the following steps: sending authentication information of a first authentication key to terminal equipment electrically connected with a connecting device, so that the terminal equipment performs validity authentication of the key based on the authentication information of the first authentication key; determining a secret key authentication result sent by the terminal equipment, wherein the secret key authentication result comprises that the secret key is valid and the secret key is invalid; if the secret key authentication result is that the secret key is invalid, authentication information of at least one second authentication secret key is sent to the terminal equipment, so that the terminal equipment performs validity authentication of the secret key based on the authentication information of the second authentication secret key until the secret key authentication result of the second authentication secret key is that the secret key is valid, and the second authentication secret key is used as a target authentication secret key; and performing protocol authentication according to the target authentication key. According to the invention, the switching of the authentication key can be realized, and the waste of resources is avoided.

Description

technical field [0001] The present application relates to the technical field of charging authentication, and in particular, to an authentication method for a connection device, an authentication device, and a connection device. Background technique [0002] Charging authentication is a protocol authentication process based on whether fast charging can be achieved between charging devices (such as charging cables, wireless charging devices, etc.) and terminal devices (such as mobile phones, tablet computers, etc.). The authentication key is valid. [0003] In the prior art, only one authentication key is usually set in the charging device. When the validity of the authentication key is determined, if the determination result is invalid, the charging device cannot realize fast charging with the terminal device, or even Cannot charge normally. [0004] This leads to the waste of resources of the charging equipment during the charging process in the prior art, and increases t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/16H04L9/40H04W12/08
CPCH04L9/16H04L63/0807H04W12/08
Inventor 虞少平佟鑫
Owner ZHEJIANG GEOFORCECHIP TECH CO LTD